CA-L-Serv Configuration Tasks › Update External Security for CA-L-Serv › How the Update Tasks are accomplished › Usage Notes
Usage Notes
Please note the following:
- Security definitions previously implemented for CA Endevor Software Change Manager or other products need not be altered. The security checks made by these products will still function in exactly the same manner.
- For administrators who do not wish to discriminate between CA‑L‑Serv data sets, defining a resource named 'ALL' in class $LSRVDSN and giving users or groups CONTROL access to this resource provides a convenient means of controlling access to CA‑L‑Serv data sets without having to make extensive new security definitions.
- Allowing users to use the $LSRVDSN class gives them access to the data sets only through CA‑L‑Serv. It does not provide any access to the data sets through any other program (such as IDCAMS REPRO).
- Privileged users who already have CONTROL access to the data sets managed by CA‑L‑Serv will be able to access data sets using CA‑L‑Serv in the same manner as outside CA‑L‑Serv. No additional definitions are necessary for these privileged users.
- The CA‑L‑Serv utility program, LDMAMS, can be executed only under a user ID that has CONTROL access to the data sets.
Important! CA Endevor Software Change Manager users must grant access to the new resource class to the 'true' user ID, not the 'alternate' user ID. When CA Endevor Software Change Manager invokes CA‑L‑Serv, the 'true' user ID is in control, not the 'alternate' user ID.
The following sections describe implementation of external security for CA‑L‑Serv in three different environments.